Vulnerabilities (CVE)

Filtered by CWE-434
Total 2650 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-41681 1 Formalms 1 Formalms 2024-11-21 N/A 9.9 CRITICAL
There is a vulnerability on Forma LMS version 3.1.0 and earlier that could allow an authenticated attacker (with the role of student) to privilege escalate in order to upload a Zip file through the SCORM importer feature. The exploitation of this vulnerability could lead to a remote code injection.
CVE-2022-41539 1 Wedding Planner Project 1 Wedding Planner 2024-11-21 N/A 8.8 HIGH
Wedding Planner v1.0 was discovered to contain an arbitrary file upload vulnerability in the component /admin/users_add.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-41538 1 Wedding Planner Project 1 Wedding Planner 2024-11-21 N/A 8.8 HIGH
Wedding Planner v1.0 was discovered to contain an arbitrary file upload vulnerability in the component /Wedding-Management-PHP/admin/photos_add.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-41537 1 Online Tours \& Travels Management System Project 1 Online Tours \& Travels Management System 2024-11-21 N/A 7.2 HIGH
Online Tours & Travels Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /user_operations/profile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-41534 1 Online Diagnostic Lab Management System Project 1 Online Diagnostic Lab Management System 2024-11-21 N/A 7.2 HIGH
Online Diagnostic Lab Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /php_action/createOrder.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-41533 1 Online Diagnostic Lab Management System Project 1 Online Diagnostic Lab Management System 2024-11-21 N/A 7.2 HIGH
Online Diagnostic Lab Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-41512 1 Online Diagnostic Lab Management System Project 1 Online Diagnostic Lab Management System 2024-11-21 N/A 7.2 HIGH
An arbitrary file upload vulnerability in the component /php_action/editFile.php of Online Diagnostic Lab Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-41504 1 Billing System Project 1 Billing System 2024-11-21 N/A 7.2 HIGH
An arbitrary file upload vulnerability in the component /php_action/editProductImage.php of Billing System Project v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-41437 1 Billing System Project Project 1 Billing System Project 2024-11-21 N/A 7.2 HIGH
Billing System Project v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /php_action/createProduct.php.
CVE-2022-41406 1 Church Management System Project 1 Church Management System 2024-11-21 N/A 7.2 HIGH
An arbitrary file upload vulnerability in the /admin/admin_pic.php component of Church Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-41387 1 Democritus 1 D8s-pdfs 2024-11-21 N/A 9.8 CRITICAL
The d8s-pdfs package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package. The affected version is 0.1.0.
CVE-2022-41386 1 Democritus 1 D8s-utility 2024-11-21 N/A 9.8 CRITICAL
The d8s-utility package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package. The affected version is 0.1.0.
CVE-2022-41385 1 Democritus 1 D8s-html 2024-11-21 N/A 9.8 CRITICAL
The d8s-html package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package. The affected version is 0.1.0.
CVE-2022-41384 1 Democritus 1 D8s-domains 2024-11-21 N/A 9.8 CRITICAL
The d8s-domains package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package. The affected version is 0.1.0.
CVE-2022-41383 1 Democritus 1 D8s-archives 2024-11-21 N/A 9.8 CRITICAL
The d8s-archives package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0.
CVE-2022-41382 1 Democritus 1 D8s-json 2024-11-21 N/A 9.8 CRITICAL
The d8s-json package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0.
CVE-2022-41381 1 Democritus 1 D8s-utility 2024-11-21 N/A 9.8 CRITICAL
The d8s-utility package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0.
CVE-2022-41380 1 Democritus 1 D8s-yaml 2024-11-21 N/A 9.8 CRITICAL
The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0.
CVE-2022-41379 1 Online Leave Management System Project 1 Online Leave Management System 2024-11-21 N/A 7.2 HIGH
An arbitrary file upload vulnerability in the component /leave_system/classes/Users.php?f=save of Online Leave Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-41267 1 Sap 1 Business Objects Business Intelligence Platform 2024-11-21 N/A 9.9 CRITICAL
SAP Business Objects Platform - versions 420, and 430, allows an attacker with normal BI user privileges to upload/replace any file on Business Objects server at the operating system level, enabling the attacker to take full control of the system causing a high impact on confidentiality, integrity, and availability of the application.